Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add SSL implementation from Supermium 121 #9

Open
JoachimHenze opened this issue Feb 24, 2024 · 2 comments
Open

Add SSL implementation from Supermium 121 #9

JoachimHenze opened this issue Feb 24, 2024 · 2 comments

Comments

@JoachimHenze
Copy link

JoachimHenze commented Feb 24, 2024

On Windows XP the Chrome browser typically uses ciphers from Windows schannel.dll implementation. Unfortunately those are not maintained by Microsoft anymore, and therefore the regular Chrome versions, including your Chromium XP v49 are not able to display specific websites which do use newer ciphers like the Elliptic curve ciphers ECDSA* and so on.

As a test the following website can be used:
https://html5test.opensuse.org
This is just one of many many examples.

It will fail to render the page with
ERR_SSL_VERSION_OR_CIPHER_MISMATCH
on Chromium-XP v49 on WinXPSP3.

but on Supermium 121 (Chromium-fork) (and all Firefox based browsers also) the site will load fine.
Firefox does always bring its own SSL implementations. But the Chromium-based Supermium 121 browser https://github.com/win32ss/supermium , which is open-source, also managed to overcome that bug by adding its own SSL implementation.

Request is to do the same for your Chromium XP.

@JoachimHenze
Copy link
Author

You may ask: Why not simply using Supermium 121 instead? The answer is that your Chromium v49 is much more lightweight on resources, faster and much more stable (atm).

@JoachimHenze
Copy link
Author

I do assume that https://github.com/win32ss/boringssl may be of use.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant